Appending is a morphological term which means the addition of one or two letters to a structure to be similar to other structures of well-known abstractor additional nouns and verbs constructions. The goal of appending is to organize what have been expanded linguistically and collect similarities to reduce the syntactic rules. This is because the appended word exists for expanding purposes; however, it has no construction of its own. An appending was included with another construction with mentioning the additional letter. This by itself means that appending as a process is a term that helps organize rather than expand language. Scholars further noticed that the appending letter is not semantically significant, and so it differs from the increasing letter (letters of sa’altomoniha). However, since every addition in the structure has an additional meaning, the appending letter must have a benefit as well. Besides, the hypothesis here is having an audio suggestive connotation adds to the different lexical, contextual and figurative connotations of a word. This connotation is the connotation of multiplication, exaggeration and amplification of the appending letters in general, and the connotation of extension and lengthening in the letters of extension in particular. The approach adopted follows the words attached to the Holy Qur’an and the scholars’ sayings of appending descriptively and analytically.
Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreA novel design and implementation of a cognitive methodology for the on-line auto-tuning robust PID controller in a real heating system is presented in this paper. The aim of the proposed work is to construct a cognitive control methodology that gives optimal control signal to the heating system, which achieve the following objectives: fast and precise search efficiency in finding the on- line optimal PID controller parameters in order to find the optimal output temperature response for the heating system. The cognitive methodology (CM) consists of three engines: breeding engine based Routh-Hurwitz criterion stability, search engine based particle
swarm optimization (PSO) and aggregation knowledge engine based cultural algorithm (CA)
This study aims to study the effect of gout disease on complete blood picture and biochemical parameters and some non-enzymatic antioxidants, some tracing elements and lipid peroxidation ,in outpatients with gout disease at Al-Ramadi Teaching-Hospital ,Al-Razi Hospital and the study duration from Octo.2013-to May 2014.(50) blood samples were collected from patients with age groups (30-80 years) from both sexes (28 males,22 females),a (30) blood samples (15 males,15 females) were collected from normal individuals as a control group with age groups (27-75 years). Hematological measurement showed no significant differences in size compressed blood cells, the percentages in ( 45.15 +4.99 and 46.87+6.30) % in patient and control groups respect
... Show MoreThe results show that the compound affects the rest of the living cells after treatment for 15 minutes The influence Almtafr has had the effect BU less than the effect of NTG in the case of the registration of every of Struptomaysan resistance and rifampicin, although the first attribute more responsive